Deniable authentication

Known as: Repudiability (cryptography), Repudiation (cryptography) 
In cryptography, deniable authentication refers to message authentication between a set of participants where the participants themselves can be… (More)
Wikipedia

Topic mentions per year

Topic mentions per year

1997-2018
051019972018

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2009
2009
Deniability enables protocol participants to deny their involvement after they have taken part in a particular protocol run. In… (More)
Is this relevant?
2009
2009
The notion of deniable authentication protocol was introduced in 1998 by Dwork et al. [11] and Aumann and Rabin [1, 2… (More)
  • figure 1
  • table 1
Is this relevant?
2007
2007
Deniability is defined as a privacy property which enables protocol principals to deny their involvement after they had taken… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
2007
2007
Deniable authentication is a technique that allows one party to send messages to another while the latter can not prove to a… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2006
Highly Cited
2006
We extend the definitional work of Dwork,Naor and Sahai from deniable authentication to deniable key-exchange protocols. We then… (More)
  • figure 1
  • figure 2
Is this relevant?
2006
2006
Tel: 886+(0)5-2721001 ext.2017 Abstract Recently, Yoon et al. and Cao et al. propose two deniable authentication protocols… (More)
Is this relevant?
2006
2006
A deniable authentication protocol allows a sender to transfer an authenticated message to a receiver in such a way that the… (More)
Is this relevant?
2006
2006
Deniable authenticated protocol is a new cryptographic authentication protocol that enables an intended receiver to identify the… (More)
  • figure 1
  • table 1
Is this relevant?
Highly Cited
2005
Highly Cited
2005
Deniable Authentication protocols allow a Sender to authenticate a message for a Receiver, in a way that the Receiver cannot… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2002
Highly Cited
2002
Digital Signatures enable authenticating messages in a way that disallows repudiation. While non-repudiation is essential in some… (More)
Is this relevant?